Entrust Datacard launches new platform for end-to-end IoT security
Entrust Datacard, a US-based provider of trusted identity and secure transaction technology solutions, has introduced the Entrust Datacard ioTrust Security Solution. The solution claims to deliver a secure and trusted digital infrastructure that safeguards data between devices, sensors, and backend platforms connected within an Internet of Things (IoT) ecosystem.
The company explains that by applying digital identities managed through definable policy, ioTrust allows companies to do business in new ways and create the trusted products and experiences that these environments demand.
With digital businesses striving to create new business models that turn stand-alone products into highly interactive and connected services, Entrust Datacard believes that companies are faced with a variety of challenges ranging from complicated integrations and extended deployment timelines to mitigating safety and privacy concerns.
ioTrust leverages capabilities such as identity, authentication and authorization, credential lifecycle management, and secure communications to help organizations securely connect the people, applications and devices that power the connected world. It also aims to speed deployment timelines, allowing organizations to more quickly realize business value in areas such as process optimization and automation, supply chain visibility, and delivery of new services.
“Unlike existing solutions that have been simply repurposed from IT environments, Entrust Datacard has spent several years working with customers and ecosystem partners to design a solution that recognizes the unique needs of IoT environments and incorporates sound security practices,” said Josh Jabs, Vice President of PKI and IoT, Entrust Datacard.“We’ve created a solution that allows organizations to enhance their service offerings, improve the user experience and enable new business models while leveraging a trusted infrastructure,” Jabs added. Capabilities of ioTrust Security Solution include:
- Enabling a secure and trusted ecosystem of people, applications and things throughout the IoT value chain
- Providing greater visibility into the security of the supply-chain, spanning from device manufacturer to the final product
- Reducing time-to-market and total cost of ownership by helping organizations to develop solutions based on heterogeneous device categories and profiles
- Empowering organizations to leverage existing infrastructures and devices, while supporting new products and services without the need to “rip and replace”
- Facilitating the secure and timely delivery of data and outcomes generated by trusted people, applications and things to the value-creation engine